CVE-2021-33037

Public on 2021-07-12
Modified on 2024-07-29
Description
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
Severity
Medium severity
Medium
CVSS v3 Base Score
4.3
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
HAQM Linux 2 - Core tomcat Not Affected
HAQM Linux 2 - Tomcat8.5 Extra tomcat 2023-08-21 ALAS2TOMCAT8.5-2023-007 Fixed
HAQM Linux 2 - Tomcat8.5 Extra tomcat 2024-02-01 ALAS2TOMCAT8.5-2024-017 Fixed
HAQM Linux 2 - Tomcat9 Extra tomcat 2023-08-21 ALAS2TOMCAT9-2023-007 Fixed
HAQM Linux 2 - Tomcat9 Extra tomcat 2024-02-01 ALAS2TOMCAT9-2024-011 Fixed
HAQM Linux 1 tomcat7 Not Affected
HAQM Linux 1 tomcat8 2021-09-02 ALAS-2021-1535 Fixed
HAQM Linux 1 tomcat8 2021-10-26 ALAS-2021-1547 Fixed
HAQM Linux 1 tomcat80 No Fix Planned
HAQM Linux 2023 tomcat9 2023-02-17 ALAS2023-2023-059 Fixed

CVSS Scores

Score Type Score Vector
HAQM Linux CVSSv3 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
NVD CVSSv2 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N
NVD CVSSv3 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N